Abstract:
A method for encoding coding a message including the steps of performing two-channel encoding of the message into a robust string and a fragile string; transmitting the robust string through a fragile channel; and transmitting the fragile string though a robust channel. Before the step of performing two-channel encoding of the message into a robust string and a fragile string the number of characters in the message may be reduced to reduce the size of the encode message. The two- channel encoding step includes the steps of creating the robust string by encoding the message using the codeword dictionary; and creating the fragile string by encoding the message using a compression algorithm. The robust string may be transmitted by embedding the robust string in an image. The fragile string may be transmitted by embedding the fragile string in a 2-D bar code.
Abstract:
A method for embedding an entire image, audio or video watermark sequence within another image, audio or video data sequence with minimum loss of data quality is presented. The method exploits the de-correlation property of data coefficients in the orthogonal transform domain, similar to the application in data compression through transform coding. The present invention describes the usage of a Discrete Cosine Transform as the embedding domain. However, other orthogonal transforms such as Fourier, Walsh-Hadamard, Haar, Sine and Wavelet can also be used for this operation. A unique key derived adaptively from spatial locations registering the thresholds of the ac transform energies is used to unlock or de-watermark the embedded image or audio sequence. Moreover, an exponential filter has been developed to compress and expand the watermark coefficients prior to the embedding and retrieval process. The method can be used in resolving multimedia copyright protection issues arising on the Internet and in the music industry, such as the inclusion of a company's logo or an artist's recorded voice. The method can also be incorporated as a built-in feature for digital recording devices, such as still and video cameras, as well as more recent devices such as VCD and DVD players. Moreover, the method can be applied to the commercial and service sectors, where security in transmission and reception of private information in terms of speech or image is of the utmost importance.
Abstract:
A data-bearing image (391) is created from a carrier image (371). The carrier image (371) is scaled to produce a scaled image. A clustered-dot halftone screen is applied to the scaled image to produce a halftone image. A resulting number of cells in the halftone image conforms to a cell count (372) that includes a horizontal cell value and a vertical cell value. Payload data is encoded into the halftone image to produce a data-bearing halftone image, including shifting pixel clusters within cells of the halftone image that include pixel clusters.
Abstract:
A method and an apparatus to process a digital image is provided. The method may comprises receiving host image data, receiving audio data and embedding the audio data within the host image data to provide an embedded image wherein the audio data if freely recoverable from the embedded image. The method may comprise processing the audio data using a Short Term Fourier Transformation (STFT) prior to embedding the audio data within the host image data. The method may reduce an amount of digital data that represents an audio signal included in the audio data prior to embedding the audio data whithin the host image. In one embodiment, the method comprises quantizing magnitude data and discarding phase data of the audio signal to provide the audio data for embedding. The method may comprises quantizing the audio data to match a shell of a D 4 Lattice.
Abstract:
A data processing device for burying additional information in coded data created by encoding image data and correctly reproducing the image data and the additional data from the coded data without increasing the amount of coded data. A burying compression-encoder (11) encodes image data according to a predetermined encoding rule and destroys the encoding rule according to the additional information so as to bury the additional information. A decoder (12) restores burying coded data generated by burying the additional information in the coded data to the coded data encoded according to the encoding rule, and thereby the additional information is decoded and the coded data is decoded to image data.
Abstract:
A method for enhancing security printing includes determining fields associated with print job variability. Physical security information is entered, and a physical security data stream is generated from the physical security information. The physical security data stream is mapped to a data stream that is used to provide settings for the fields for the print job variability. The fields for the print job variability are set based upon the mapping the physical security data stream.
Abstract:
A method for embedding metadata into a media file (100) comprises providing (204) a metadata schema file (204) and a metadata instance file (206). Providing a media file having a binary capable user field. Then compressing (208) the metadata schema by a first compression method; and assembling (210) the compressed metadata schema fragments. Also, compressing (212) the metadata instance file and assembling (210) the compressed metadata instance fragments. Setting a media file header (214) or footer to indicate binary data payload. The method further comprises appending (216) a data start label to the assembled metadata schema and the assembled metadata instance and inserting (218) the assembled metadata schema and the metadata instance into the binary capable user field of the media file.
Abstract:
A method for embeding and detecting the hiding codes, wherein, the method for embeding the hiding codes comprising: a type of format deformation being looked as one channel, selecting at least one of the channels to represent the hiding codes which is to be embeded into a document, each type of format distortion includes N-level distortions, wherein N is a positive integer greater than or equal to 2,and the number N of the different format deformations can be same or different; Determining the hiding code sequence for the hiding code with respect to each type of the format deformation, the code length after being converted is M, wherein the M is a positive integer; K words which are require to be format deformed are selected from said document including words, wherein K is positive integer and K=M; These selected K words are format deformed based on the determined code sequence. Hiding information according to the present invention is easy to be operated and handiness. With respect to the electronic document which mostly including words, high anti-jamming can be obtained with said method for embeding and detecting the hiding codes, and said method has good tolerance with respect to various common jam methods.
Abstract:
An apparatus for printing out recovered image data from a photograph is disclosed. The data is recorded in infrared ink on top of the image itself in an encoded fault tolerant digital form enabling the image to be recovered notwithstanding damage to the photograph surface. The apparatus can print out the image after processing the data. If the data is stored then the image can be printed as many times as required. Alternatively, the photograph can be repeatedly passed through the scanner or reader the required number of times. In another form of the invention, the apparatus can also print out the image with the image data again recorded in infrared ink using a printer which has the necessary number of ink jet nozzles to do so and the apparatus has the necessary processing capacity to process, compress, scramble and encode the data.